Download presentation
Presentation is loading. Please wait.
Published byArjun Berfield Modified over 9 years ago
1
Survey of Vehicular Network Security Jonathan Van Eenwyk
2
2 Contents Design Issues Certificate-Based Solution Privacy Concerns Data Validation
3
3 Design Issues The Security and Privacy of Smart Vehicles IEEE Security and Privacy, May/June 2004: Hubaux, Čapkun, Luo Attacks on Inter-Vehicle Communication Systems-an Analysis Aijaz, et al (supported by industry) Challenges in Securing Vehicular Networks HotNets-IV: Parno and Perrig Security Issues in a Future Vehicular Network European Wireless, 2002: Zarki, et al 1234
4
4 Design Issues The Security and Privacy of Smart Vehicles IEEE Security and Privacy, May/June 2004: Hubaux, Čapkun, Luo System model Ad-hoc communication between vehicles and base stations Base stations provide services Vehicles provide sensor data Vehicles have more resources than most ad-hoc networks Applications Traffic and safety alerts Travel tips Infotainment (including Internet access) 1234
5
5 Design Issues The Security and Privacy of Smart Vehicles IEEE Security and Privacy, May/June 2004: Hubaux, Čapkun, Luo Challenges Authentication and data encryption Auditing sensor data Privacy (avoid tracking) Infrastructure boot-strapping Negative perception of smart vehicles 1234
6
6 Design Issues The Security and Privacy of Smart Vehicles IEEE Security and Privacy, May/June 2004: Hubaux, Čapkun, Luo Key Features Context sensors (front-end radar, ultra-sound, etc) Event data recorder (i.e., “black box”) Tamper-proof device to handle encrypted transmissions Location detection (GPS or distance bounding) Communication with road-side base stations 1234
7
7 Certificate-Based Solution The Security of Vehicular Networks EPFL Technical Report, March 2005: Raya, Hubaux Certificate Revocation in Vehicular Networks LCA Report 2006: Raya, Jungels, Papadimitratos, Aad, Hubaux 1234
8
8 Certificate-Based Solution The Security of Vehicular Networks EPFL Technical Report, March 2005: Raya, Hubaux Attacks Bogus information Message tampering Cheating (data manipulation, impersonation) Identity disclosure for vehicle tracking Denial of service 1234
9
9 Certificate-Based Solution The Security of Vehicular Networks EPFL Technical Report, March 2005: Raya, Hubaux Security Mechanisms Electronic License Plate (post-mortem auditing) Asymmetric encryption using public key infrastructure Large number of anonymous keys (no identity information) Vehicles frequently change keys to avoid tracking Keys can be revoked (more later) Physical layer protection against denial of service Channel switching Implement more than one communication technology 1234
10
10 Certificate-Based Solution Certificate Revocation in Vehicular Networks LCA Report 2006: Raya, Jungels, Papadimitratos, Aad, Hubaux Revocation using Compressed Certificate Revocation Lists (RC 2 RL) Large number of vehicles, so potentially huge revocation list Lossy compression using Bloom filter Configurable rate of false positives Definitely no false negatives Bit vector of length m Hash a with k hashing functions Each function sets one bit Later, verify membership if all k bits are set as expected 1234
11
11 Certificate-Based Solution Certificate Revocation in Vehicular Networks LCA Report 2006: Raya, Jungels, Papadimitratos, Aad, Hubaux Revocation of the Tamper-Proof Device (RTPD) Send message to vehicle’s TPD to revoke all activity Send to base stations nearest last known location Broadcast over low-bandwidth radio (AM/FM) or satellite Lower overhead approach as long as TPD is reachable Send localized revocation list to surrounding area 1234
12
12 Certificate-Based Solution Certificate Revocation in Vehicular Networks LCA Report 2006: Raya, Jungels, Papadimitratos, Aad, Hubaux Distributed Revocation Protocol (DRP) Vehicles that detect malicious nodes can warn others Requires an honest majority Warnings have lower weight if sending node has also been condemned by other nodes Node 4 condemns node 2 But this warning has less weight because node 4 has itself been condemned by nodes 1 and 3 1 23 4 1234
13
13 Privacy Concerns Balancing Auditability and Privacy in Vehicular Networks Q2SWinet '05: Choi, Jakobsson, Wetzel CARAVAN: Providing Location Privacy for VANET ESCAR '05: Sampigethaya, Huang, Li, Poovendran, Matsuura, Sezaki 1234
14
14 Privacy Concerns Balancing Auditability and Privacy in Vehicular Networks Q2SWinet '05: Choi, Jakobsson, Wetzel Provide privacy From peer-to-peer vehicles From infrastructure authorities Support auditability Linkability between anonymous handles and owner identity Requires off-line permission granting (court order, etc) 1234
15
15 Privacy Concerns Balancing Auditability and Privacy in Vehicular Networks Q2SWinet '05: Choi, Jakobsson, Wetzel Two-Level Infrastructure Back-end (ombudsman) Creates long-term “handle” from node identities Nodes initialized with set of handles Off-line approval can grant identity from pseudonym Front-end (road-side base stations) Uses short-term pseudonyms created from long-term handles Pseudonym and shared key created from handle and timestamp 1234
16
16 Privacy Concerns CARAVAN: Providing Location Privacy for VANET ESCAR '05: Sampigethaya, Huang, Li, Poovendran, Matsuura, Sezaki Provide privacy from vehicle location tracking Proposed Techniques Update pseudonym after random silence period Fixed-interval updates can be tracked by estimating trajectory Silence period obscures nodes if other nodes are present Designate group leader to proxy communications Avoids redundant transmissions Extends length of time to use each pseudonym 1234
17
17 Data Validation Probabilistic Validation of Aggregated Data in Vehicular Ad-hoc Networks VANET '06: Picconi, Ravi, Gruteser, Iftode Detecting and Correcting Malicious Data in VANETs VANET '04: Golle, Grenne, Staddon 1234
18
18 Data Validation Probabilistic Validation of Aggregated Data in Vehicular Ad-hoc Networks VANET '06: Picconi, Ravi, Gruteser, Iftode Allow sensor data to be aggregated Use signing certificates to validate data Randomly force one complete record to be included Relies heavily on tamper-proof device 1234
19
19 Data Validation Detecting and Correcting Malicious Data in VANETs VANET '04: Golle, Grenne, Staddon Nodes attempt to identify malicious data via information sharing Nodes detect neighbors and contribute to global database Malicious nodes may contribute invalid or spoofed data May try to fake a traffic jam Friendly nodes build models to explain database observations Is there one malicious node attempting to spoof three other nodes? Are all four nodes malicious? Possible heuristic: choose scenario with fewest bad and spoofed nodes 1234
20
20 Data Validation Detecting and Correcting Malicious Data in VANETs VANET '04: Golle, Grenne, Staddon Example Actual Scenario Possible Explanations 1234
21
21 Questions? 1234 Design IssuesCertificate-Based Solution Privacy Concerns Data Validation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.